v3.26.1
Cybersecurity Risk Management and Strategy Disclosure
12 Months Ended
Dec. 31, 2025
Cybersecurity Risk Management, Strategy, and Governance [Abstract]  
Cybersecurity Risk Management Processes for Assessing, Identifying, and Managing Threats [Text Block]

Like all companies that utilize technology, we are subject to threats of breaches of our technology systems. To mitigate the threat to our business, our goal to take a comprehensive approach to cybersecurity risk management. Our lack of capital has prevented us from having a more robust cybersecurity program. The company’s data and its security is actively managed with oversight from a 3rd party IT provider. Due to the lack of capital, we have not devoted sufficient resources to cybersecurity. We intend to make investments to maintain the security of our data and cybersecurity infrastructure when feasible including based on our access to sufficient capital. There can be no guarantee that our policies and procedures will be properly followed in every instance or that those policies and procedures will be effective. We do not believe that risks from prior cybersecurity threats have materially affected our business to date. We can provide no assurance that there will not be incidents in the future or that future attacks will not materially affect us, including our business strategy, results of operations, or financial condition. in early 2026 we experienced a hacking incident wherein a malicious third party attempted to impersonate our President to divert funds.